☆18Feb 4, 2016Updated 10 years ago
Alternatives and similar repositories for Leaked_Malware_SourceCode
Users that are interested in Leaked_Malware_SourceCode are comparing it to the libraries listed below
Sorting:
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- Malware samples observed in the wild from time to time☆12Jul 29, 2019Updated 6 years ago
- Archive of leaked Equation Group materials☆17Aug 17, 2016Updated 9 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- Bypass Antivm and Cuckoo Sandbox Techniques☆12Oct 12, 2016Updated 9 years ago
- Emulator for Windows Malware Analysis☆15Feb 26, 2022Updated 4 years ago
- kMVX: Detecting Kernel Information Leaks with Multi-variant Execution☆22Aug 30, 2019Updated 6 years ago
- Simple script that validates payment through a payment gateway even though the payment never went through. Basically fool a website that …☆17Aug 14, 2024Updated last year
- XSS Weaponization☆34Sep 23, 2013Updated 12 years ago
- Code repository for Blender for Designers, published by Packt☆12Jan 14, 2021Updated 5 years ago
- Backdoored Electron app.asar☆17Jun 11, 2021Updated 4 years ago
- Powerful tool that guesses the email of aged accounts via the "password reset" option at Instagram. This allows you to find the potential…☆13Aug 1, 2021Updated 4 years ago
- Simple Antivirus☆10Dec 24, 2016Updated 9 years ago
- Hacker-gems installs most needed gems for hackers☆13Aug 3, 2017Updated 8 years ago
- DotNetObfuscator☆19Dec 24, 2016Updated 9 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 8 years ago
- a showcase of prompts I use and their outputs☆17Dec 4, 2025Updated 3 months ago
- Shading, Lighting, and Rendering with Blender’s EEVEE, published by Packt☆16Jan 18, 2023Updated 3 years ago
- Juniper backdoor☆14Dec 24, 2015Updated 10 years ago
- 3D Graphics API low-level abstraction layer☆10Jul 18, 2019Updated 6 years ago
- Xanity PHP RAT leak For Researchers☆21Dec 3, 2015Updated 10 years ago
- Malicious Software SRC Extract☆32Jan 2, 2023Updated 3 years ago
- Détecteur box vulnérables à la brèche PIN NULL☆13Sep 15, 2017Updated 8 years ago
- This is an updated version of Dendroid with a working panel & APK, I hope that everyone enjoys this download.☆41Aug 15, 2014Updated 11 years ago
- Demo blogging application using the AWS SDK for JavaScript in the browser☆30Jan 25, 2018Updated 8 years ago
- Source code and slides for my presentations at CppCon2016☆12Sep 19, 2016Updated 9 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆35Nov 14, 2016Updated 9 years ago
- Best Tool to Increase Instagram Follower☆18Sep 19, 2021Updated 4 years ago
- Security Analysis of OpenStack Big Tent Projects. Mirror of code maintained at opendev.org.☆11Jun 25, 2022Updated 3 years ago
- go-mruby make interface to embed mruby into go.☆85Nov 20, 2015Updated 10 years ago
- Application features: Sets visibility of its own executeable file to hidden --> Adds itself to the registry of run-on-startup application…☆11Jan 30, 2019Updated 7 years ago
- The official engine source code for Project ORKA☆10Nov 25, 2024Updated last year
- Malicious Software SRC Extract☆76Dec 31, 2016Updated 9 years ago
- Generate custom binaural audio with a GUI.☆15Jan 30, 2020Updated 6 years ago
- ORM Framework☆14Jul 20, 2024Updated last year
- This utility allows you to lock every available memory regions of an arbitrary process into its working set.☆69May 6, 2023Updated 2 years ago
- Linux kernel based keylogger☆14Mar 24, 2014Updated 11 years ago
- Source code of 2023 ITHome Ironman Challenge☆14Oct 1, 2023Updated 2 years ago
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago